Jump to ratings and reviews
Rate this book

Introduction to Computer Security and Information Assurance

Rate this book
This book is now available as part of The Big Computer Science Book Bundle. Get more for less. About This book will provide you with a not-too-technical guide for information security; we’ll cover everything from social engineering to cyber warfare. This book is right for anyone who wants to know more about information assurance (security), you won’t need any prior experience in the field as this book is an introduction and aims to get you up to speed in the information security field. ContentsIn chapter 1 we start off by discussing the basic concepts on information assurance, we’ll talk about the meaning of information, a little about risk, security goals and who might want to attack us. In chapter 2 we go onto looking at the various types of attacks we may face. In chapter 3 we discuss the three security goals in more detail, look at the advantages and disadvantages of offensive and defensive security and compare the various security models most widely used today. Chapter 4 is concerned with how we measure risk and how we mitigate it through the use of standards. Chapter 5 discusses possible business constraints, the economy and the problem of security and it’s cost.In chapter 6 we discuss some of the security technologies we can put in place to mitigate the attacks from chapter 2. Chapter 7 explains the ‘human problem’ in security and how your staff are often your biggest vulnerability. In chapter 8 we look at the differences between personal, business and government data and the issues each face. In chapter 9 we move onto looking at the different policies commonly put in place and best practices for the industry. Chapter 10 discusses how we can put better controls in place, build a business continuity plan and try mitigating some of the risks. Chapter 11 is concerned with the law, however we recognise IT professionals are not lawyers so we only step through a general overview of some relevant acts. Chapter 12 is concerned with the forensics side of the industry, collecting data and presenting it in court; along with the challenges computer forensic analysis’s face. We then move onto looking at incident response in chapter 13, how to keep the businesses running even after a disaster. Finally we consider cyber warfare in chapter 14.

91 pages, Kindle Edition

First published April 30, 2014

Loading...
Loading...

About the author

Phil Smith

168 books8 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
2 (100%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.